ICIT Certified Content: This content has been reviewed by ICIT and deemed valuable content for the community. We encourage you to study it and socialize it with your networks.
As cyber attacks become more sophisticated and focus on physical implications, technology leaders need to understand the convergence of cyber and physical security strategies. Leaders are being asked to balance their security strategies while outside factors such as the explosive rise in disruptionware post-Covid 19 and the mandate to implement zero trust programs demand immediate action. The rapid shift to remote work during the pandemic, increased the security perimeter beyond the walls of the organization. Threat actors capitalized on this changing perimeter to attack physical targets Developing a zero trust position addresses the changing security perimeter by shifting the paradigm from “trust but verify” to a stance that requires continuous monitoring. Lawmakers, regulatory entities, and though–leaders should collaborate on proactive and actionable governance that clearly articulates zero trust principles, sets distinct goals and metrics, and establishes viable cyber-physical implementation roadmaps.
This paper explores the rise in cyberattacks with physical ramifications (such as ransomware attacks on healthcare systems or the Colonial Pipeline attacks) and provides leaders with recommendations to merge cyber and physical security strategies.
Read the Full Paper
The post ICIT Certified Content | Crossing the Digital Divide: From Bits and Bytes to Reality appeared first on ICIT (Institute for Critical Infrastructure Technology).